HRM chapter no.7 (Interviw of employee)Qamar Farooq
ย
The document discusses different types of interviews used in employment selection. It describes selection interviews, which are used to predict job performance, appraisal interviews for performance reviews, and exit interviews. Structured interviews follow a set sequence of questions, while unstructured interviews allow more flexibility. Common question types include situational, behavioral, and job-related questions. Effective interviews are structured, use objective rating scales, and involve multiple interviewers when possible. The document provides guidelines for an effective interview, such as preparing questions linked to job duties and controlling the discussion.
The document describes the research method, respondents, instrument, and data collection procedure used in a study. Specifically:
- A descriptive research method was used to analyze problems encountered by student teachers. Convenience sampling was used to select respondents.
- The respondents were student teachers conveniently available to answer a researcher-made survey questionnaire containing questions about demographics and problems in five areas.
- The questionnaire was validated by experts and pre-tested before distribution. Data was collected after securing permission, by distributing and collecting the completed questionnaires.
The document provides an overview of survey research and questionnaire design. It discusses that surveys are used to collect data and facts from a target population about a certain situation or issue. The key steps in survey research include developing hypotheses, designing the survey questions and format, sampling, data collection, analysis, and reporting findings. It also describes different types of surveys, methods of data collection including mail, interview and telephone surveys, and considerations for question structure, format, and response options. The document emphasizes that carefully designing and testing the questionnaire is important for effective survey research.
This study used a descriptive correlational survey method to examine the impact of social networking sites as information dissemination tools of government agencies as perceived by second year Foreign Service students at Lyceum of the Philippines University Cavite Campus. Questionnaires were administered to 82 second year Foreign Service students to collect data on the role and impact of social networking sites, and their potential benefits as public information tools. A Likert scale was used to analyze the data and determine student perceptions.
An overview of, and introduction to, survey-based research in the social sciences.
http://en.wikiversity.org/wiki/Survey_research_and_design_in_psychology/Lectures/Survey_research
The document discusses different types of interviews used in research, including structured, unstructured, individual, and focus group interviews. It describes the key characteristics of focus group interviews such as including 6-8 participants, asking open-ended questions, and training the interviewer. The document also outlines techniques for properly conducting interviews such as preparing questions in advance, actively listening without bias, and maintaining rapport with the interviewee.
This presentation provides an overview of different types of interviews. It defines an interview as a conversation between two people where the interviewer asks questions to obtain information. The main types of interviews discussed are face-to-face, behavioral, phone, panel, exit, stress, and technical interviews. For each type, the presentation provides a brief description of its format and purpose. The presentation concludes with tips for interviewees, such as researching the company in advance, arriving early, maintaining good body language, and following up in a timely manner if offered the job.
The document discusses various types of research including applied research, basic research, correlational research, descriptive research, ethnographic research, experimental research, and exploratory research. Applied research seeks practical solutions to problems, while basic research expands knowledge without a direct application. Correlational research examines relationships between variables without determining cause and effect. Descriptive research provides accurate portrayals of characteristics, and ethnographic research involves in-depth study of cultures. Experimental research establishes cause-and-effect through controlled manipulation of variables.
HRM chapter no.7 (Interviw of employee)Qamar Farooq
ย
The document discusses different types of interviews used in employment selection. It describes selection interviews, which are used to predict job performance, appraisal interviews for performance reviews, and exit interviews. Structured interviews follow a set sequence of questions, while unstructured interviews allow more flexibility. Common question types include situational, behavioral, and job-related questions. Effective interviews are structured, use objective rating scales, and involve multiple interviewers when possible. The document provides guidelines for an effective interview, such as preparing questions linked to job duties and controlling the discussion.
The document describes the research method, respondents, instrument, and data collection procedure used in a study. Specifically:
- A descriptive research method was used to analyze problems encountered by student teachers. Convenience sampling was used to select respondents.
- The respondents were student teachers conveniently available to answer a researcher-made survey questionnaire containing questions about demographics and problems in five areas.
- The questionnaire was validated by experts and pre-tested before distribution. Data was collected after securing permission, by distributing and collecting the completed questionnaires.
The document provides an overview of survey research and questionnaire design. It discusses that surveys are used to collect data and facts from a target population about a certain situation or issue. The key steps in survey research include developing hypotheses, designing the survey questions and format, sampling, data collection, analysis, and reporting findings. It also describes different types of surveys, methods of data collection including mail, interview and telephone surveys, and considerations for question structure, format, and response options. The document emphasizes that carefully designing and testing the questionnaire is important for effective survey research.
This study used a descriptive correlational survey method to examine the impact of social networking sites as information dissemination tools of government agencies as perceived by second year Foreign Service students at Lyceum of the Philippines University Cavite Campus. Questionnaires were administered to 82 second year Foreign Service students to collect data on the role and impact of social networking sites, and their potential benefits as public information tools. A Likert scale was used to analyze the data and determine student perceptions.
An overview of, and introduction to, survey-based research in the social sciences.
http://en.wikiversity.org/wiki/Survey_research_and_design_in_psychology/Lectures/Survey_research
The document discusses different types of interviews used in research, including structured, unstructured, individual, and focus group interviews. It describes the key characteristics of focus group interviews such as including 6-8 participants, asking open-ended questions, and training the interviewer. The document also outlines techniques for properly conducting interviews such as preparing questions in advance, actively listening without bias, and maintaining rapport with the interviewee.
This presentation provides an overview of different types of interviews. It defines an interview as a conversation between two people where the interviewer asks questions to obtain information. The main types of interviews discussed are face-to-face, behavioral, phone, panel, exit, stress, and technical interviews. For each type, the presentation provides a brief description of its format and purpose. The presentation concludes with tips for interviewees, such as researching the company in advance, arriving early, maintaining good body language, and following up in a timely manner if offered the job.
The document discusses various types of research including applied research, basic research, correlational research, descriptive research, ethnographic research, experimental research, and exploratory research. Applied research seeks practical solutions to problems, while basic research expands knowledge without a direct application. Correlational research examines relationships between variables without determining cause and effect. Descriptive research provides accurate portrayals of characteristics, and ethnographic research involves in-depth study of cultures. Experimental research establishes cause-and-effect through controlled manipulation of variables.
Windows is a popular operating system that runs on both PCs and servers. It provides a large collection of software solutions due to its popularity. While early versions of Windows were not true operating systems, modern versions like Windows Server provide stable and secure platforms for business applications and services. Failover clustering allows applications to remain highly available by failing over from one node to another in the case of hardware or software failures. The performance of an operating system depends on the underlying hardware, application load, and OS configuration.
The document provides an introduction to operating systems, covering their basic functions and components. It discusses how operating systems manage hardware resources and provide abstraction for applications. The key components described include the kernel, drivers, utilities, and applications/processes. It also covers process scheduling, file systems, APIs/system calls, memory management, and popular operating systems like IBM z/OS, IBM i, and OpenVMS.
Midrange systems sit between mainframes and x86 servers, and are produced by IBM, HP, and Oracle. They use components from a single vendor and the vendor's operating system, making them stable, highly available, and secure. Shared memory architectures allow multiple CPUs to access all memory. UMA architectures have uniform memory access times, while NUMA architectures have non-uniform times depending on memory location. Virtualization provides logical partitions for isolation and high utilization. Compute availability features include hot-swappable components, parity and ECC memory, and lockstepping for redundancy. Virtualization provides failover clustering to automatically restart virtual machines if a host fails.
The document provides an overview of compute infrastructure, including:
- Physical computers contain components like CPUs, memory, ports, and connectivity.
- Early computers used vacuum tubes and punch cards. Transistors and ICs reduced size and cost.
- Common processor types include Intel/AMD x86, ARM, IBM POWER, Oracle SPARC.
- Early computer memory included magnetic cores and RAM chips replaced it. RAM types are SRAM and DRAM.
- The BIOS controls a computer from power on until the operating system loads.
This document provides an overview of storage technologies and concepts. It discusses the history of storage technologies from early drum memory to modern hard disks and solid state drives. Key concepts covered include RAID configurations, disk interfaces like SATA and SAS, tape storage technologies, storage controllers, and virtual tape libraries. The document concludes with a discussion of Kryder's law and projections for future disk capacity growth.
This document provides an overview of key concepts in IT infrastructure architecture related to networking. It discusses the presentation and application layers, protocols like SSL/TLS, HTTP, and email protocols. It also covers infrastructure services like DHCP, DNS, NTP, and IPAM systems. Additionally, it summarizes network virtualization techniques like VLANs, VXLANs, virtual NICs, and virtual switches. Finally, it discusses software defined networking, network function virtualization, layered network topologies, spine-leaf architectures, network teaming, and the spanning tree protocol.
This document provides an overview of IT infrastructure architecture and networking building blocks and concepts. It discusses the evolution from mainframe computers to local area networks and the internet. The key networking concepts covered include the OSI reference model, physical layer components like cables, patch panels and network interface cards, as well as datalink layer protocols like Ethernet and Wi-Fi.
Datacenters house most IT infrastructure hardware in racks and provide power, cooling, fire protection and equipment space. Today's large datacenters contain thousands of servers in shipping container sized blocks. Datacenters are categorized based on size and tenant usage. Proper location, physical structure, layout, power supply, cooling, fire protection and availability tiers are important considerations for datacenter design and operation. Physical security restricts access to protect equipment.
This document outlines a security concept and risk management process. It discusses identifying risks and assets, assessing impact and probability, and determining appropriate risk responses such as acceptance, avoidance, mitigation, and transfer. It also describes common security controls around availability, confidentiality and integrity. Attack vectors like malware, denial of service attacks, social engineering and phishing are examined. Finally, it discusses security patterns for identity and access management, segregation of duties, layered security and cryptography.
The document discusses key concepts for designing IT infrastructure to ensure high performance. It covers perceived performance from a user perspective, benchmarking systems, profiling users to predict load, identifying and managing bottlenecks, scaling systems horizontally and vertically, load balancing, caching frequently used data, and designing systems based on their intended use to optimize performance. The overall goal is to design infrastructure that can meet performance requirements under all conditions, both currently and as load increases over time.
This document discusses various concepts related to ensuring adequate performance of IT infrastructure. It covers perceived performance from an end user perspective and how to account for performance during infrastructure design. Methods discussed for evaluating performance during the design phase include benchmarking, leveraging vendor experience, prototyping, and user profiling. The document also addresses managing performance of running systems through techniques like performance testing, identifying and addressing bottlenecks, leveraging caching, and scaling infrastructure through vertical and horizontal expansion approaches like load balancing.
This document discusses availability concepts for IT infrastructure architecture. Some key points include:
- Availability is calculated based on uptime percentage over time (usually annually or monthly), with 99.9% being a common service level agreement target.
- Downtime is influenced by factors like mean time between failures (MTBF) and mean time to repair (MTTR). Redundancy and failover help improve availability.
- Sources of downtime include human errors, software bugs, planned maintenance, hardware failures, environmental issues, and infrastructure complexity. Redundancy, failover, and fallback solutions can help address some causes of downtime.
Non-functional attributes describe qualitative behaviors of a system like security, performance, and availability rather than specific functions. While important for successful implementation and use, non-functional requirements often receive less attention than functional services but greatly impact a system's acceptance, as performance issues can deter users. An infrastructure architect must consider how infrastructure delivers non-functional attributes and present any conflicting requirements to stakeholders to make informed decisions on quality tradeoffs.
This document provides an introduction to IT infrastructure architecture, defining key concepts and building blocks. It discusses how infrastructures have become more complex with new applications and the need for agility. The definition of infrastructure is examined, noting it depends on perspective. Infrastructure comprises processes/information, applications, application platforms, and underlying hardware/network blocks. Non-functional requirements like availability, performance and security are crucial to infrastructure and often conflicting to balance. Architecture is needed to manage infrastructure design, use and changes.
This document provides an introduction to IT infrastructure, defining its key components and concepts. It discusses how infrastructures have become more complex with new applications and specialized hardware. The infrastructure is comprised of building blocks including processes/information, applications, application platforms, and underlying infrastructure components like servers, storage, networking, and datacenters. Non-functional attributes like availability, performance, and security are also essential considerations in infrastructure architecture.
The document discusses the importance of documenting network designs, whether in response to a customer's request for proposal (RFP) or independently. It recommends that an RFP response follow the specified format and include topics like the design, implementation plan, pricing and qualifications. For independent documentation, it suggests including an executive summary, requirements, current/proposed designs, implementation plan and budget. Typical sections of a design document are executive summary, requirements, logical/physical designs, implementation plan and budget. Possible appendixes provide supplementary details.
This document discusses various methods for optimizing network design and performance, including using IP multicast to efficiently deliver multimedia streams, reducing serialization delay through link fragmentation and compressed RTP, and supporting quality of service through techniques like IP precedence, differentiated services, 802.1p prioritization, advanced switching and queuing methods, RED, CAR, and traffic shaping.
Testing a network design is important to:
1) Verify that key business and technical goals are met;
2) Validate technology and device selections; and
3) Identify any bottlenecks or connectivity problems.
This document discusses selecting technologies and devices for enterprise networks. It covers remote access technologies like PPP, ISDN, cable modems and DSL. For WANs it discusses leased lines, SONET, Frame Relay and ATM. Selection criteria for remote access devices, VPN concentrators, routers and WAN service providers are provided. Key factors include business needs, cost, performance, security, manageability, supported protocols and geographical coverage.
This document discusses selecting technologies and devices for campus network designs. It covers considerations for the physical cabling plant design including centralized vs distributed topologies. Common media types are discussed such as copper, optical fiber, and wireless. Specific technologies like Ethernet variants and their characteristics are outlined. Selection criteria for internetworking devices that will make up the campus network are presented, including processing power, port counts, latency, throughput and support/quality factors. The document provides guidance on evaluating options for building out the physical implementation of a previously designed logical campus network.
Windows is a popular operating system that runs on both PCs and servers. It provides a large collection of software solutions due to its popularity. While early versions of Windows were not true operating systems, modern versions like Windows Server provide stable and secure platforms for business applications and services. Failover clustering allows applications to remain highly available by failing over from one node to another in the case of hardware or software failures. The performance of an operating system depends on the underlying hardware, application load, and OS configuration.
The document provides an introduction to operating systems, covering their basic functions and components. It discusses how operating systems manage hardware resources and provide abstraction for applications. The key components described include the kernel, drivers, utilities, and applications/processes. It also covers process scheduling, file systems, APIs/system calls, memory management, and popular operating systems like IBM z/OS, IBM i, and OpenVMS.
Midrange systems sit between mainframes and x86 servers, and are produced by IBM, HP, and Oracle. They use components from a single vendor and the vendor's operating system, making them stable, highly available, and secure. Shared memory architectures allow multiple CPUs to access all memory. UMA architectures have uniform memory access times, while NUMA architectures have non-uniform times depending on memory location. Virtualization provides logical partitions for isolation and high utilization. Compute availability features include hot-swappable components, parity and ECC memory, and lockstepping for redundancy. Virtualization provides failover clustering to automatically restart virtual machines if a host fails.
The document provides an overview of compute infrastructure, including:
- Physical computers contain components like CPUs, memory, ports, and connectivity.
- Early computers used vacuum tubes and punch cards. Transistors and ICs reduced size and cost.
- Common processor types include Intel/AMD x86, ARM, IBM POWER, Oracle SPARC.
- Early computer memory included magnetic cores and RAM chips replaced it. RAM types are SRAM and DRAM.
- The BIOS controls a computer from power on until the operating system loads.
This document provides an overview of storage technologies and concepts. It discusses the history of storage technologies from early drum memory to modern hard disks and solid state drives. Key concepts covered include RAID configurations, disk interfaces like SATA and SAS, tape storage technologies, storage controllers, and virtual tape libraries. The document concludes with a discussion of Kryder's law and projections for future disk capacity growth.
This document provides an overview of key concepts in IT infrastructure architecture related to networking. It discusses the presentation and application layers, protocols like SSL/TLS, HTTP, and email protocols. It also covers infrastructure services like DHCP, DNS, NTP, and IPAM systems. Additionally, it summarizes network virtualization techniques like VLANs, VXLANs, virtual NICs, and virtual switches. Finally, it discusses software defined networking, network function virtualization, layered network topologies, spine-leaf architectures, network teaming, and the spanning tree protocol.
This document provides an overview of IT infrastructure architecture and networking building blocks and concepts. It discusses the evolution from mainframe computers to local area networks and the internet. The key networking concepts covered include the OSI reference model, physical layer components like cables, patch panels and network interface cards, as well as datalink layer protocols like Ethernet and Wi-Fi.
Datacenters house most IT infrastructure hardware in racks and provide power, cooling, fire protection and equipment space. Today's large datacenters contain thousands of servers in shipping container sized blocks. Datacenters are categorized based on size and tenant usage. Proper location, physical structure, layout, power supply, cooling, fire protection and availability tiers are important considerations for datacenter design and operation. Physical security restricts access to protect equipment.
This document outlines a security concept and risk management process. It discusses identifying risks and assets, assessing impact and probability, and determining appropriate risk responses such as acceptance, avoidance, mitigation, and transfer. It also describes common security controls around availability, confidentiality and integrity. Attack vectors like malware, denial of service attacks, social engineering and phishing are examined. Finally, it discusses security patterns for identity and access management, segregation of duties, layered security and cryptography.
The document discusses key concepts for designing IT infrastructure to ensure high performance. It covers perceived performance from a user perspective, benchmarking systems, profiling users to predict load, identifying and managing bottlenecks, scaling systems horizontally and vertically, load balancing, caching frequently used data, and designing systems based on their intended use to optimize performance. The overall goal is to design infrastructure that can meet performance requirements under all conditions, both currently and as load increases over time.
This document discusses various concepts related to ensuring adequate performance of IT infrastructure. It covers perceived performance from an end user perspective and how to account for performance during infrastructure design. Methods discussed for evaluating performance during the design phase include benchmarking, leveraging vendor experience, prototyping, and user profiling. The document also addresses managing performance of running systems through techniques like performance testing, identifying and addressing bottlenecks, leveraging caching, and scaling infrastructure through vertical and horizontal expansion approaches like load balancing.
This document discusses availability concepts for IT infrastructure architecture. Some key points include:
- Availability is calculated based on uptime percentage over time (usually annually or monthly), with 99.9% being a common service level agreement target.
- Downtime is influenced by factors like mean time between failures (MTBF) and mean time to repair (MTTR). Redundancy and failover help improve availability.
- Sources of downtime include human errors, software bugs, planned maintenance, hardware failures, environmental issues, and infrastructure complexity. Redundancy, failover, and fallback solutions can help address some causes of downtime.
Non-functional attributes describe qualitative behaviors of a system like security, performance, and availability rather than specific functions. While important for successful implementation and use, non-functional requirements often receive less attention than functional services but greatly impact a system's acceptance, as performance issues can deter users. An infrastructure architect must consider how infrastructure delivers non-functional attributes and present any conflicting requirements to stakeholders to make informed decisions on quality tradeoffs.
This document provides an introduction to IT infrastructure architecture, defining key concepts and building blocks. It discusses how infrastructures have become more complex with new applications and the need for agility. The definition of infrastructure is examined, noting it depends on perspective. Infrastructure comprises processes/information, applications, application platforms, and underlying hardware/network blocks. Non-functional requirements like availability, performance and security are crucial to infrastructure and often conflicting to balance. Architecture is needed to manage infrastructure design, use and changes.
This document provides an introduction to IT infrastructure, defining its key components and concepts. It discusses how infrastructures have become more complex with new applications and specialized hardware. The infrastructure is comprised of building blocks including processes/information, applications, application platforms, and underlying infrastructure components like servers, storage, networking, and datacenters. Non-functional attributes like availability, performance, and security are also essential considerations in infrastructure architecture.
The document discusses the importance of documenting network designs, whether in response to a customer's request for proposal (RFP) or independently. It recommends that an RFP response follow the specified format and include topics like the design, implementation plan, pricing and qualifications. For independent documentation, it suggests including an executive summary, requirements, current/proposed designs, implementation plan and budget. Typical sections of a design document are executive summary, requirements, logical/physical designs, implementation plan and budget. Possible appendixes provide supplementary details.
This document discusses various methods for optimizing network design and performance, including using IP multicast to efficiently deliver multimedia streams, reducing serialization delay through link fragmentation and compressed RTP, and supporting quality of service through techniques like IP precedence, differentiated services, 802.1p prioritization, advanced switching and queuing methods, RED, CAR, and traffic shaping.
Testing a network design is important to:
1) Verify that key business and technical goals are met;
2) Validate technology and device selections; and
3) Identify any bottlenecks or connectivity problems.
This document discusses selecting technologies and devices for enterprise networks. It covers remote access technologies like PPP, ISDN, cable modems and DSL. For WANs it discusses leased lines, SONET, Frame Relay and ATM. Selection criteria for remote access devices, VPN concentrators, routers and WAN service providers are provided. Key factors include business needs, cost, performance, security, manageability, supported protocols and geographical coverage.
This document discusses selecting technologies and devices for campus network designs. It covers considerations for the physical cabling plant design including centralized vs distributed topologies. Common media types are discussed such as copper, optical fiber, and wireless. Specific technologies like Ethernet variants and their characteristics are outlined. Selection criteria for internetworking devices that will make up the campus network are presented, including processing power, port counts, latency, throughput and support/quality factors. The document provides guidance on evaluating options for building out the physical implementation of a previously designed logical campus network.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
ย
(๐๐๐ ๐๐๐) (๐๐๐ฌ๐ฌ๐จ๐ง ๐)-๐๐ซ๐๐ฅ๐ข๐ฆ๐ฌ
๐๐ข๐ฌ๐๐ฎ๐ฌ๐ฌ ๐ญ๐ก๐ ๐๐๐ ๐๐ฎ๐ซ๐ซ๐ข๐๐ฎ๐ฅ๐ฎ๐ฆ ๐ข๐ง ๐ญ๐ก๐ ๐๐ก๐ข๐ฅ๐ข๐ฉ๐ฉ๐ข๐ง๐๐ฌ:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
๐๐ฑ๐ฉ๐ฅ๐๐ข๐ง ๐ญ๐ก๐ ๐๐๐ญ๐ฎ๐ซ๐ ๐๐ง๐ ๐๐๐จ๐ฉ๐ ๐จ๐ ๐๐ง ๐๐ง๐ญ๐ซ๐๐ฉ๐ซ๐๐ง๐๐ฎ๐ซ:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
ย
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
How to Manage Reception Report in Odoo 17Celine George
ย
A business may deal with both sales and purchases occasionally. They buy things from vendors and then sell them to their customers. Such dealings can be confusing at times. Because multiple clients may inquire about the same product at the same time, after purchasing those products, customers must be assigned to them. Odoo has a tool called Reception Report that can be used to complete this assignment. By enabling this, a reception report comes automatically after confirming a receipt, from which we can assign products to orders.
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
ย
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
ย
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapitolTechU
ย
Slides from a Capitol Technology University webinar held June 20, 2024. The webinar featured Dr. Donovan Wright, presenting on the Department of Defense Digital Transformation.
what is interview and responsibilites of the interwiee.
1. What is interview
The word interview comes from Latin and middle French words meaning to โsee betweenโ or โsee each
otherโ. Generally, interview means a private meeting between people when questions are asked and
answered. The person who answers the questions of an interview is called interviewee. The person who
asks the questions of our interview is called an interviewer. It suggests a meeting between two persons
for the purpose of getting a view of each other or for knowing each other.
According to Gary Dessler, โAn interview is a procedure designed to obtain information from a personโs
oral response to oral inquiries.โ
According to Thill and Bovee, โAn interview is any planed conversation with a specific purpose involving
two or more peopleโ.
According to Dr. S. M. Amunuzzaman, โInterview is a very systematic method by which a person enters
deeply into the life of even a stranger and can bring out needed information and data for the research
purpose.โ
While preparing for an interview, employees usually look at what the job posting or job description says
in order to get a better understanding of what is expected of them should they get hired. Exceptionally
good interviewees look at the wants and needs of a job posting and shows off how good they are at
those abilities during the interview to impress the interviewer and increase their chances of getting a
job.
Before an interview
Attaining a job can be strenuous and stressful and preparing for a job interview could just help
increase an intervieweeโs confidence and control. Because receiving a job is not as simple as just
arriving to an interview; the interviewee must place effort in preparing for the interview. Three ways
to successfully be prepared for an interview are to: research the organization, prepare oneโs
appearance, and to rehearse oneself.
Organizational research:
The first step to successfully be prepared for the interview is to obtain background knowledge on the
organization.
(i) Research the company:
A good place to initiate the research of a company can be from the websites and annual reports.
The companyโs website provides much information on different features of the companyโs daily
performance, such as services they provide and the diversified types of industries they do business
with. Furthermore, annual reports provide much useful information about the financial position of the
companyโs present and past positions and could also aware the interviewee of the pay or benefits to
be received.
(ii) Research the career Field:
Applying for a job requires knowledge about the job characteristics and duties. Although some
companies provide the objectives and the qualifications of the job position, they do not fully
explicate the general characteristics and job duties of an accountant or human resources manager.
(iii) Research the interviewer:
Many of the bigger companies comprise publications, press, and contact information that provide
supplementary information about the interviewers. But preparing for personal appearance is also
2. important because it determines the employerโs first impression. Therefore, the interviewee must
learn how to establish that memorable first impression.
Personal appearance preparation:
The second step in the preparation for the interview is personal appearance.
(i) Attire:
The way an individual looks, can alter the whole mindset of another; therefore, four significant
components should be fulfilled: dark basic suit, well-shined shoes, dress shirt and a tie.
(ii) Accessories:
Accessories should be limited to a minimum to keep it simple and professional. And women should
limit their purses from being too big and should match their shoes.
(iii) Grooming:
The first impression is vastly important and yet employers say they donโt make their decision based
on first impression, it still influences their decisions. Looking professionally and being clean can
alter the outcome of the interview because it could augment the intervieweeโs confidence level,
therefore, performing better.
Rehearsal:
The third step in preparation for the interview is rehearsal.
(i) Questions:
In reducing anxiety, part of the preparation involves creating a list of potential questions that
interviewers commonly ask. Some of these questions include: โTell me about yourself? What are
your strengths and weaknesses? Why do you want this job? Why should we hire you?
(ii)Answers:
After creating a list of potential questions, practice answering them as if it was an actual interview.
When practicing, it would be helpful if someone else could be in the position of the interviewer to
experience the situation in reality.
Participation in the interview
Getting an interview is a good step to put oneโs foot in the door, therefore, it is important to value this
opportunity and to leave a lasting experience. Because there are many applicants and being selected to
be an interviewee is not very easy, interviewees should grasp this opportunity to show who they really
are. The three ways to leave a lasting memory for the employer are to use: positive nonverbal
communication, proper social skills, and to avoid any inappropriate behavior.
Nonverbal communication:
It may not only be what you say in an interview that matters, but also how you say it (e.g., how fast you
speak)and how you behave during the interview (e.g., hand gestures, eye contact). In other words,
although applicantโs responses to interview questions influence interview ratings, their nonverbal
behaviors may also affect interviewer judgments. In responding to questions, answer in an organized
manner to not skip back and forth or to mention anything extra.
Proper social skills:
The step to be successful in the duration of the interview is to use proper social skills. Knowing how to
ask and answer questions properly allows the interviewee to not get caught by his/her own words, but
instead taking the right approach into answering various questions, including positive and negative
3. characteristics.
Positive Characteristics: As the interview takes charge and the interviewer begins with โTell me about
your selfโ statement, the intervieweeโs responsibility is to lay out positive characteristics, or strengths,
in an organized manner.
Negative Characteristics: When the โWhat are your weaknesses?โ question comes up, it seems like
the hardest question of them all. Because all humans have strengths and weaknesses, the way to excel
this question is to acknowledge weaknesses that are least related to the job performance.
Avoiding inappropriate behavior:
There are numerous inappropriate behaviors that should be avoided, the three most common ones are:
excessively nervous, not honest or too forthcoming, and acting desperate.
Excessively Nervous: Having some anxiety is perfectly normal, but some interviewees take
nervousness to the extreme. Different examples of nervousness to be considered inappropriate are:
giggling, babbling, and even forgetting what position the applicant applied for.
Not honest or too forthcoming: Different problems arise when honesty is an issue. Whenever and
interviewer asks questions, it is important for the interviewee to be honest and not lie. For example, if
the minimum age requirement to be employed is 16 and the applicant is 15, the applicant must answer
truthfully if the question of age comes up. However, being too truthful or forthcoming is not a suggested
approach. For example, if the interviewer asks โWhy do you want this job?โ the intervieweeโs answer
should not be โBecause I want the 30% discount.โ Being too honest or not honest enough applicants
have a higher degree of not receiving the job.
Acting Desperate: Although there are many incentives from a job, such as money, benefits, and
insurance, the interviewee should not express inappropriate behavior such as acting desperate. From
the hiring managersโ past experience, applicants took many desperate measures to get the job, which
included: gifts, money, shine the shoes of the hiring manager. These types of behaviors should be
avoided as they are unethical and diminish the self-value of the interviewee.
After an interview
After the interview is over, much of the anxiety is relieved, but there are still two last important steps
to perform: a thank you letter and a follow-up. By performing these last two steps, it is a way to
remind the interviewer about the intervieweeโs qualifications and the interview experience, therefore
increasing the chances of receiving the job.
Thank you letter:
The first step to do right after an interview is to send a thank you letter within 24 hours of the interview.
In sending a thank you letter to the interviewer, the interviewee appreciates the time and opportunity of an
interview. Before writing a thank you letter, the interviewee should be informed three important
approaches about the letter which are: what to include, how to write it, and how to send it. A sample
thank you letter.
(i) What to include:
The three important things to include in a thank you letter are to: reiterate oneโs expertise, address
unresolved points, and highlight oneโs successes. If the interviewer mentioned issues, challenges, or
specific needs for the company, the interviewee should restate his/her expertise and demonstrate how
he/she can meet those needs. If there were unresolved points or just ran out of time, including finishing
thoughts would be a good place to include in the letter. Lastly, if the interviewer mentioned what consists
4. of the qualified candidate, the thank you letter is a great place to remind the interviewer how one meets or
exceeds those qualifications.
(i) How to write it:
When writing a thank you letter, the three ways to make the interviewer remember their interviewees is
to: personalize it, express enthusiasm, and write clearly and concisely. Because there are various
applicants and many who write thank you letters as well, the interviewee should personalize it in a unique
way by mentioning things that are most memorable to the interviewer.
In addition, when writing the thank you letter, express enthusiasm because it shows interest in the
company and the position. Lastly, writing in a clear and concise manner allows the reader to understand
the writer and is not perplexed by the flowery and longwinded letter.
How to send it:
Once the thank you letter is complete, there are three preferable options to send it: hard copy, hand
written or email. Sending the thank you letter in a hard copy is the most formal and always appropriate
for interviews. If the interviewee decides to hand write the letter, it shows a more personal approach
towards the message. Thank you letters sent by email are usually appropriate when the contact expressed
his/her preference for email.
By submitting a thank you letter to the interviewer, the interviewee shows gratitude, respect, and
continual interest in the job. Although it is imperative to send a thank you letter, it is also important to
follow-up to continue showing interest in the job offer and to debrief the outcome or decision of the
employer.
Follow up
The second step to perform after the interview is to follow-up with the employer. In order to perform a
successful follow-up phone call or email message, the interviewee should know at least three factors in
implementing it: when, how, and why.
When and How: When following up with the interview, it is appropriate to do so within two weeks of
the interview. When performing a follow-up, it is preferable to use email or telephone to contact the
employer because it shows the applicantโs continual interest in the job they applied for. Reaching the
employer too soon shows that the applicant is too desperate and bothersome, and reaching the
employer too late shows the lack of interest in the position. Therefore, it is important to contact the
employer at the right time and not too often because it is aggravating otherwise.
Why: It is important to follow-up with any job interview because it shows the employer that the
interviewee is putting effort into receiving the job and greatly cares about it. Because job positions
usually have many applicants, the follow-up email or phone call helps the employer remember who is
calling, the skills the person possesses, and how they could fit into the company.
In the closure of an interview, it is imperative for the interviewee to send a thank you letter within 24
hours as it does show appreciation and care. The final step to wrap up the whole interview process is to
follow-up with the interviewer within two weeks to show continual interest.